{"id":113300,"date":"2024-08-01T11:30:00","date_gmt":"2024-08-01T15:30:00","guid":{"rendered":"https:\/\/jumpcloud.com\/?p=113300"},"modified":"2024-10-08T14:30:54","modified_gmt":"2024-10-08T18:30:54","slug":"intune-vs-jumpcloud-for-discovering-shadow-it","status":"publish","type":"post","link":"https:\/\/jumpcloud.com\/blog\/intune-vs-jumpcloud-for-discovering-shadow-it","title":{"rendered":"Intune vs. JumpCloud for Discovering Shadow IT"},"content":{"rendered":"\n

People who don\u2019t have the tool to get a job done will find one that works. That\u2019s why shadow IT<\/a>, software or services that are unaccounted for and unauthorized, exists. It may even underlie important business processes, which is why it\u2019s extremely important to discover what\u2019s really out there.<\/p>\n\n\n\n

Shadow IT creates security concerns, can impact operations, and easily becomes a roadblock on the path to digital transformation. The overall impact is that it makes managing your infrastructure a lot more complicated from onboarding new hires to supporting business needs.<\/p>\n\n\n\n

This article will assist you in your efforts to identify shadow IT and make it possible using the fewest resources. It also compares JumpCloud’s open directory platform and Microsoft Intune for auditing application usage and provides additional resources to help you along the way.<\/p>\n\n\n\n

Techniques to Discover Shadow IT<\/h2>\n\n\n\n

Discovering and managing shadow IT requires a multipronged approach. You can\u2019t just buy a secure, compliant, and efficient IT environment. By implementing these strategies, you\u2019ll gain better visibility into your IT environment and mitigate the risks associated with shadow IT.<\/p>\n\n\n\n

<\/p><\/div>

Note:<\/strong> \n

Check out this article on shadow IT statistics and solutions<\/a>.<\/p>\n <\/div><\/div><\/div><\/div>\n\n\n\n

Talk to Your People<\/h3>\n\n\n\n

Do you have any specific concerns or areas where you suspect shadow IT might be occurring? Conduct surveys and interviews with employees to understand what tools they are using and why. Even still, there\u2019s no substitute for walking the floor: you\u2019ll be amazed at what you uncover. <\/p>\n\n\n\n

For instance, employees may use macros in word processing apps for reporting. Policy baselines can impact that workflow, which may prevent work from happening. The person in charge of reporting can tell you how important the macros are to their job, if you\u2019re willing to go to them and ask the right questions. Try to remember to actively listen and avoid punishing people for using unauthorized apps, especially if they were in place before your time.<\/p>\n\n\n\n

Cloud Access Security Brokers (CASBs)<\/h3>\n\n\n\n

CASBs can help you discover and manage shadow IT by monitoring cloud app usage and identifying unsanctioned apps. You\u2019ll gain greater visibility and be able to perform a risk assessment on any discovered SaaS apps. CASBs are often used for data loss prevention and control and enforcement of policies for compliance and security purposes. Note that a small- to medium-sized enterprise (SME) may not require all of the capabilities that a CASB provides.<\/p>\n\n\n\n

Network Monitoring<\/h3>\n\n\n\n
\"screenshot\"<\/figure>\n\n\n\n

Image credit: <\/em>WireShark<\/em><\/a><\/p>\n\n\n\n

Network monitoring includes using tools to track unusual data patterns or irregularities, which can indicate the use of unapproved applications or services. There are numerous free and open source network monitoring tools<\/a> available to use; however, it can be challenging work. Some free and open source tools include Cacti, Prometheus, WireShark, and Zabbix. <\/p>\n\n\n\n

Some of the challenges of using network monitoring are:<\/p>\n\n\n\n